US20170214546A1 - Systems and methods for implementing a layer two proxy for wireless network data - Google Patents

Systems and methods for implementing a layer two proxy for wireless network data Download PDF

Info

Publication number
US20170214546A1
US20170214546A1 US15/002,591 US201615002591A US2017214546A1 US 20170214546 A1 US20170214546 A1 US 20170214546A1 US 201615002591 A US201615002591 A US 201615002591A US 2017214546 A1 US2017214546 A1 US 2017214546A1
Authority
US
United States
Prior art keywords
layer
frames
network connection
tunnel
packets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/002,591
Other versions
US11108592B2 (en
Inventor
Jeffrey L. Finkelstein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cox Communications Inc
Original Assignee
Cox Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cox Communications Inc filed Critical Cox Communications Inc
Priority to US15/002,591 priority Critical patent/US11108592B2/en
Assigned to COX COMMUNICATIONS, INC. reassignment COX COMMUNICATIONS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FINKELSTEIN, JEFFREY L.
Publication of US20170214546A1 publication Critical patent/US20170214546A1/en
Application granted granted Critical
Publication of US11108592B2 publication Critical patent/US11108592B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • H04L61/2007
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/59Network arrangements, protocols or services for addressing or naming using proxies for addressing
    • H04W72/0406
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5038Address allocation for local use, e.g. in LAN or USB networks, or in a controller area network [CAN]
    • H04L61/6022
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/182Network node acting on behalf of an other network entity, e.g. proxy

Definitions

  • Mobile devices may be utilized to connect to service provider networks using software tunnels.
  • GRE Generic Routing Encapsulation
  • a Generic Routing Encapsulation (GRE) tunneling protocol may be utilized to provide layer two (i.e., 802.3) frames thereby enabling the mobile devices to act as part of another network.
  • GRE Generic Routing Encapsulation
  • 3GPP 3rd Generation Partnership Project
  • 3GPP2 3rd Generation Partnership Project 2
  • IPSec Internet Protocol Security
  • current methods make it difficult provide only layer two frames to join another network as these frames require the use of both the GRE tunneling protocol in addition to IPSec protocols.
  • FIG. 1 illustrates an example network that includes devices configured to implement a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure.
  • FIG. 2 illustrates an example computing environment for implementing a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure.
  • FIG. 3 illustrates a block diagram of an example environment for utilizing a layer two proxy to send layer two frames from mobile devices to a service function chain (SFC) infrastructure, according to an embodiment of the disclosure.
  • SFC service function chain
  • FIG. 4 illustrates a block diagram of an example environment for utilizing a layer two proxy to send Internet protocol (IP) packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • IP Internet protocol
  • FIG. 5 illustrates a flow diagram of an example process for utilizing a layer two proxy for sending layer two frames from mobile devices to an SFC infrastructure, according to an embodiment of the disclosure.
  • FIG. 6 illustrates a flow diagram of an example process for utilizing a layer two proxy for sending IP packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • Certain embodiments herein relate to, among other things, implementing a termination device (which may be either a wireless access gateway or a virtual router gateway) as a layer two proxy for providing Open Systems Interconnection (OSI) Model layer two (e.g., media access control (MAC) layer, data link layer, etc.) frames to a service provider network having a service function chain (SFC) infrastructure.
  • OSI Open Systems Interconnection
  • MAC media access control
  • SFC service function chain
  • One example implementation may relate to the proxy receiving a request, over a wireless access network, to establish a tunnel over an OSI Model layer three network connection from one or more mobile devices. The proxy may then establish the tunnel. The proxy may then receive via the tunnel, device information and wireless network information from one or more mobile devices.
  • the proxy may assign source and destination addresses to each mobile device.
  • the source and destination addresses may correspond to the device information and the wireless network information.
  • the proxy may further receive Internet protocol (IP) packets, via the tunnel, from each mobile device.
  • IP Internet protocol
  • the proxy may generate layer two frames utilizing the assigned source and destination addresses.
  • the layer two frames may encapsulate each of the IP packets.
  • the proxy may transmit the layer two frames to the SFC infrastructure.
  • the proxy may receive IP packets encapsulated in layer two frames from the SFC infrastructure. The proxy may then separate the (i.e., strip) the layer two frames from the IP packets. The proxy may then send the IP packets to one or more mobile devices via a tunnel.
  • a termination device e.g., a wireless access gateway (WAG) or a virtual router gateway (VRG)
  • WAG wireless access gateway
  • VRG virtual router gateway
  • IPSec Internet Protocol Security
  • the termination device may act as a layer 2 (802.3) proxy.
  • the proxy may, for a unique mobile device/access network pair, create and/or assign a corresponding source/destination media access control (MAC) pair.
  • MAC media access control
  • the proxy may further, for each IP packet received from a mobile device, generate corresponding layer 2 or 802.3 frames using the created/assigned source MAC/destination MAC pair to encapsulate each IP packet.
  • the proxy may, in some instances, need to handle fragmentation and reassembly during the encapsulation process.
  • the proxy may then feed the layer 2 frames into any SFC infrastructure requiring layer 2 frames.
  • the proxy may strip the layer 2 frames and just insert IP packets into the tunnel back to the mobile device.
  • the proxy may facilitate a tunnel which eliminates the need to create layer 2 frames and insert them into a Generic Routing Encapsulation (GRE) tunnel on top of the an IPSec tunnel which is a requirement of previously utilized software tunnels such as SoftGRE.
  • GRE Generic Routing Encapsulation
  • a termination proxy device (which may be either a wireless access gateway or a virtual router gateway) may be implemented as a layer two proxy for providing OSI Model layer two (e.g., MAC layer, data link layer, etc.) frames to a service provider network having an SFC infrastructure.
  • FIG. 1 depicts an example network architecture 100 that includes devices configured to enable such an implementation.
  • the architecture 100 may include, but is not limited to, a wireless access gateway (WAG) 110 (hereinafter referred to as the proxy 110 ) that may be in communication with various mobile devices 120 a - 120 c (hereinafter the mobile devices 120 ) and a residential gateway 124 over a layer 3 wireless access network 130 .
  • WAG wireless access gateway
  • the residential gateway 124 (which may be configured to provide cellular access to the wireless access network 130 ), may be located at a customer premises and may be connected to various user devices such as security system 122 a , television 122 b and laptop computer 122 c as well as a cable modem 126 .
  • the proxyl 10 may also be in communication with one or more service provider networks 150 which may include a layer 2 SFC infrastructure 160 .
  • the proxy 110 may be a termination device which functions as a layer 2 proxy for communicating layer 2 (or 802.3) frames from the mobile devices 120 and/or the residential gateway 124 to the SFC infrastructure 160 .
  • the proxy 110 may be configured to utilize a tunnel (i.e., a layer 3 IPSec tunnel) 140 for receiving 802.3 frames from the mobile devices 120 (and/or the residential gateway 124 ) for sending to the SFC infrastructure 160 .
  • a tunnel i.e., a layer 3 IPSec tunnel
  • the wireless access network 130 may be either a 3rd Generation Partnership Project (3GPP) (i.e., GSM) or a 3rd Generation Partnership Project 2 (3GPP2) (i.e., CDMA) network.
  • 3GPP 3rd Generation Partnership Project
  • 3GPP2 3rd Generation Partnership Project 2
  • CDMA Code Division Multiple Access
  • the term “device” may refer to any computing component that includes one or more processors that can be configured to execute computer-readable, computer-implemented, or computer-executable instructions.
  • Example devices may include, but are not limited to, customer premise equipment, set-top boxes, cable modems, digital tablets, digital assistants, personal digital assistants, smart phones, personal computers, server farms, Internet appliances, smart cards, wearable devices, application-specific circuits, microcontrollers, minicomputers, transceivers, kiosks, or other processor-based devices.
  • the execution of suitable computer-implemented instructions by one or more processors associated with various devices may form special purpose computers or other particular machines that may implement or facilitate a personal cloud experience for users as described herein.
  • FIG. 1 The above descriptions in FIG. 1 are for purposes of illustration and are not meant to be limiting. Other descriptions, examples, embodiments, etc., may exist in other examples.
  • FIG. 2 depicts an example computing environment 200 for implementing a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure.
  • the example computing environment 200 may include, but is not limited to, the proxy 110 and the mobile devices 120 . Although a certain number of these devices are shown in FIG. 2 , any number of these devices may exist in other embodiments.
  • other devices may include the residential gateway 124 , the cable modem 126 and the user devices 122 shown in FIG. 1 .
  • the proxy 110 in FIG. 2 may communicate with the mobile devices 120 over the wireless access network 130 .
  • the proxy 110 in FIG. 2 may include one or more processors configured to communicate with one or more memory devices and various other components or devices.
  • the proxy 110 may include one or more processors 212 that are configured to communicate with one or more memory or memory devices 222 , one or more input/output (I/O) devices 214 , storage 216 , one or more communication connections 218 , and one or more data stores 220 .
  • the processor 212 may be implemented as appropriate in hardware, software, firmware, or a combination thereof.
  • the hardware devices 242 - 250 associated with each of the mobile devices 120 may be the same or at least similar to the processor 212 , the I/O devices 214 , the storage 216 , the communication connection 218 and the data store 220 , respectively, in the proxy 110 .
  • the memory 222 of the proxy 110 may store program instructions that are loadable and executable on the processor 212 , as well as data generated during the execution of these programs.
  • the memory 222 may be volatile, such as random access memory (RAM), and/or non-volatile, such as read-only memory (ROM), flash memory, etc.
  • RAM random access memory
  • ROM read-only memory
  • the memory 262 associated with each of the mobile devices 120 may be the same or at least similar to the memory 222 .
  • the storage 216 of the proxy 110 may include removable and/or non-removable storage including, but not limited to, magnetic storage, optical disks, and/or tape storage.
  • the disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the computing devices.
  • the storage associated within the home gateway 240 and the user device 270 , respectively, may be the same or at least similar to the storage 216 .
  • the memory 222 and the storage 216 are all examples of computer-readable storage media.
  • computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
  • the memory 222 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM), or ROM.
  • the one or more communication connections 218 may allow the proxy 110 to communicate with the mobile devices 120 .
  • the I/O devices 214 may enable interaction with the proxy 110 .
  • Such I/O devices 214 may include, but are not limited to, a keyboard, a mouse, a pen, a voice input device, a touch input device, a gesture capture or detection device, a display, a camera or imaging device, speakers, or a printer.
  • the data store 220 may store lists, arrays, databases, flat files, etc. In some implementations, the data store 220 may be stored in memory external to the proxy 110 but may be accessible via the wireless access network 130 . In some embodiments, all or at least a portion of such information may be stored in the data stores 220 , while at least another portion of the information may be stored in one or more databases or other storage mechanisms, whether local or remote from the proxy 110 .
  • the memory 222 may include an operating system 224 and various software applications and/or modules that may implement or facilitate the processes described herein.
  • Example modules may include, but are not limited to, a communication module 226 , a device identification module 228 , a service authentication module 230 , and a tunnel module 232 .
  • Each of these modules may be implemented as individual modules that provide specific functionality associated with the processes implemented or facilitate herein by the proxy 110 . Alternatively, one or more of the modules may perform all or at least some of the functionality associated with the other modules.
  • the operating system 224 may refer to a collection of software that manages computer hardware resources and provides common services for computer programs to enable and facilitate operation of such programs.
  • Example operating systems may include Android, other mobile device operating systems, UNIX, Microsoft Windows, Apple OS X, Mac OS, Linux, Solaris, etc.
  • the operating system 264 associated with each of the mobile devices 120 may include at least one of the above example operating systems.
  • the communication module 226 may configure the proxy 110 to communicate with the mobile devices 120 shown in FIG. 2 , as described above.
  • the device identification module 228 may identify the mobile devices 120 . Such identification may include determining device and network (i.e., the wireless access network 130 ) information for the mobile devices 120 .
  • the service authentication module 230 may authenticate access to layer 2 services in the SFC infrastructure 160 of the service provider network 150 . By knowing which mobile device 120 has requested a service, the service authentication module 230 may determine whether the mobile device 120 and/or a user of the mobile device 120 may access the service.
  • the memory 252 of the proxy 110 may include a tunnel module 256 .
  • the tunnel module 256 may establish a tunnel with the mobile devices 120 , in one embodiment.
  • the memory 282 of each of the mobile devices 120 may include one or more user applications 686 .
  • the one or more user applications 266 may configure the mobile devices 120 to send, receive, interact with, etc., various content, such as video, audio, data, multimedia, text, and other information.
  • FIG. 3 illustrates a block diagram of an example environment 300 for utilizing a layer two proxy to send layer two frames from mobile devices to a service function chain (SFC) infrastructure, according to an embodiment of the disclosure.
  • the environment 300 of FIG. 3 includes the proxy 110 , the mobile devices 120 , and the SFC infrastructure 160 .
  • the proxy 110 may be configured to establish the tunnel 140 and receive (over the tunnel 140 ) device information and wireless network information 310 from the mobile devices 120 .
  • the proxy 110 may then be configured to create and/or assign a source and destination MAC addresses 330 corresponding to the received device and wireless network information 310 .
  • the proxy 110 may also receive (over the tunnel 140 ) one or more IP packets from the mobile devices 120 .
  • the proxy 110 may then be configured to generate layer two frames 340 utilizing the assigned source and destination MAC addresses 330 .
  • the layer two frames 340 encapsulate the IP packets 320 received from the mobile devices 120 .
  • the proxy 110 may then transmit the layer 2 frames 350 to the SFC infrastructure 160 .
  • FIG. 4 illustrates a block diagram of an example environment 400 for utilizing a layer two proxy to send Internet protocol (IP) packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • the environment 400 of FIG. 4 includes the proxy 110 , the mobile devices 120 , and the SFC infrastructure 160 .
  • the proxy 110 may be configured to receive layer two frames 410 from the SFC infrastructure 160 .
  • the layer two frames may include encapsulated IP packets 420 .
  • the proxy 110 may then strip the layer two frames 410 and insert only the IP packets 420 into the tunnel 140 , back to the mobile devices 120 .
  • FIG. 5 depicts a flow diagram of an example process 500 for utilizing a layer two proxy for sending layer two frames from mobile devices to an SFC infrastructure, according to an embodiment of the disclosure.
  • the example process 500 may be implemented by the proxy 110 of FIGS. 1-4 .
  • the example process 500 may begin at block 502 , where the proxy 110 may receive (e.g., by the communication module 226 ) mobile device and wireless network information, from the tunnel 140 , for the mobile devices 120 .
  • the mobile device and wireless network information may be received over a layer three network connection.
  • the tunnel 140 may be an IPsec tunnel.
  • the layer three network connection may be a cellular network connection.
  • the cellular network connection may include, but is not limited to, a global system for mobile communications (GSM) network connection, a code division multiple access (CDMA) network connection, and a long-term evolution (LTE) network connection.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • LTE long-term evolution
  • the example process 500 may continue at block 504 , where the proxy 110 may assign source and destination addresses corresponding to the device and wireless network information received at block 502 .
  • the source address may be a source media access control (MAC) address and the destination address may be a destination MAC address.
  • MAC media access control
  • the example process 500 may continue at block 506 , where the proxy 110 may receive IP packets from the mobile devices 120 from the tunnel 140 .
  • the example process 500 may continue at block 508 , where the proxy 110 may generate layer two frames to encapsulate each received IP packet using the assigned source and destination MAC addresses.
  • the layer two frames may be 802.3 downlink frames.
  • the example process 500 may continue at block 510 , where the proxy 110 may transmit the layer two frames to the SFC infrastructure 160 .
  • FIG. 6 depicts a flow diagram of an example process 600 for utilizing a layer two proxy for sending IP packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • the example process 600 may be implemented by the proxy 110 of FIGS. 1-4 .
  • the example process 600 may begin at block 602 , where the proxy 110 may receive (e.g., by the communication module 226 ) layer 2 frames having encapsulated IP packets from the SFC infrastructure 160 .
  • the example process 600 may continue at block 604 where the proxy 110 may separate (i.e., strip) the layer two frames from the IP packets.
  • the layer two frames may be 802.3 uplink frames.
  • the example process 600 may continue at block 606 where the proxy 110 may send the IP packets to the mobile devices 120 using the tunnel 140 .
  • the proxy 110 may be configured to insert the IP packets into an IPsec tunnel over a layer three connection with the mobile devices 120 .
  • the layer three network connection may be a cellular network connection.
  • the cellular network connection may include, but is not limited to, a GSM network connection, a CDMA network connection, and an LTE network connection.
  • the computer-executable program instructions may be loaded onto a special purpose computer or other particular machine, a processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions that execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flow diagram block or blocks.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks.
  • embodiments of the invention may provide for a computer program product, comprising a computer-usable medium having a computer-readable program code or program instructions embodied therein, said computer-readable program code adapted to be executed to implement one or more functions specified in the flow diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flow diagram block or blocks.
  • blocks of the block diagrams and flow diagrams support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, can be implemented by special purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.

Abstract

A request to establish a tunnel over a layer three network connection may be received by a proxy device. The tunnel may then be established by the proxy device. Device information and wireless network information from a mobile device may be received over the tunnel. Responsive to receipt of the device information and the wireless network information, source and destination addresses may be assigned to the mobile device. The source and destination addresses may correspond to the device information and the wireless network information. Internet protocol (IP) packets may be received, via the tunnel, from the mobile device. Layer two frames may be generated utilizing the assigned source and destination addresses. The layer two frames may encapsulate each of the IP packets. The layer two frames may be transmitted to a layer two service function chain (SFC) infrastructure.

Description

    BACKGROUND
  • Mobile devices may be utilized to connect to service provider networks using software tunnels. For example, a Generic Routing Encapsulation (GRE) tunneling protocol may be utilized to provide layer two (i.e., 802.3) frames thereby enabling the mobile devices to act as part of another network. Currently, this is done in 3rd Generation Partnership Project (3GPP) and 3rd Generation Partnership Project 2 (3GPP2) networks utilizing Internet Protocol Security (IPSec) (i.e., layer three) protocols to encapsulate data traffic. However, current methods make it difficult provide only layer two frames to join another network as these frames require the use of both the GRE tunneling protocol in addition to IPSec protocols.
  • BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1 illustrates an example network that includes devices configured to implement a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure.
  • FIG. 2 illustrates an example computing environment for implementing a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure.
  • FIG. 3 illustrates a block diagram of an example environment for utilizing a layer two proxy to send layer two frames from mobile devices to a service function chain (SFC) infrastructure, according to an embodiment of the disclosure.
  • FIG. 4 illustrates a block diagram of an example environment for utilizing a layer two proxy to send Internet protocol (IP) packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • FIG. 5 illustrates a flow diagram of an example process for utilizing a layer two proxy for sending layer two frames from mobile devices to an SFC infrastructure, according to an embodiment of the disclosure.
  • FIG. 6 illustrates a flow diagram of an example process for utilizing a layer two proxy for sending IP packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure.
  • Certain implementations will now be described more fully below with reference to the accompanying drawings, in which various implementations and/or aspects are shown. However, various aspects may be implemented in many different forms and should not be construed as limited to the implementations set forth herein; rather, these implementations are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. Like numbers refer to like elements throughout.
  • DETAILED DESCRIPTION
  • Certain embodiments herein relate to, among other things, implementing a termination device (which may be either a wireless access gateway or a virtual router gateway) as a layer two proxy for providing Open Systems Interconnection (OSI) Model layer two (e.g., media access control (MAC) layer, data link layer, etc.) frames to a service provider network having a service function chain (SFC) infrastructure. One example implementation may relate to the proxy receiving a request, over a wireless access network, to establish a tunnel over an OSI Model layer three network connection from one or more mobile devices. The proxy may then establish the tunnel. The proxy may then receive via the tunnel, device information and wireless network information from one or more mobile devices. Responsive to receipt of the device information and the wireless network information, the proxy may assign source and destination addresses to each mobile device. The source and destination addresses may correspond to the device information and the wireless network information. The proxy may further receive Internet protocol (IP) packets, via the tunnel, from each mobile device. The proxy may generate layer two frames utilizing the assigned source and destination addresses. The layer two frames may encapsulate each of the IP packets. The proxy may transmit the layer two frames to the SFC infrastructure.
  • In another example implementation, the proxy may receive IP packets encapsulated in layer two frames from the SFC infrastructure. The proxy may then separate the (i.e., strip) the layer two frames from the IP packets. The proxy may then send the IP packets to one or more mobile devices via a tunnel.
  • In example embodiments, a termination device (e.g., a wireless access gateway (WAG) or a virtual router gateway (VRG)) may be configured to establish a tunnel over a layer three wireless access network to allow mobile devices to use the Internet Protocol Security (IPSec) model for communicating layer 2 (802.3) frames to a service function chain (SFC) infrastructure within a service provider network. Thus, the termination device may act as a layer 2 (802.3) proxy. The proxy may, for a unique mobile device/access network pair, create and/or assign a corresponding source/destination media access control (MAC) pair. The proxy may further, for each IP packet received from a mobile device, generate corresponding layer 2 or 802.3 frames using the created/assigned source MAC/destination MAC pair to encapsulate each IP packet. The proxy may, in some instances, need to handle fragmentation and reassembly during the encapsulation process. The proxy may then feed the layer 2 frames into any SFC infrastructure requiring layer 2 frames. Additionally, for downlink frames (i.e., frames coming back from a layer 2 centric SFC to a mobile device), the proxy may strip the layer 2 frames and just insert IP packets into the tunnel back to the mobile device. Therefore, the proxy may facilitate a tunnel which eliminates the need to create layer 2 frames and insert them into a Generic Routing Encapsulation (GRE) tunnel on top of the an IPSec tunnel which is a requirement of previously utilized software tunnels such as SoftGRE.
  • The above descriptions of example implementations are for purposes of illustration and are not meant to be limiting. Although each of these implementations is described in greater detail below, such descriptions are also not meant to be limiting. Other descriptions, examples, etc., may also exist.
  • As described above, a termination proxy device (which may be either a wireless access gateway or a virtual router gateway) may be implemented as a layer two proxy for providing OSI Model layer two (e.g., MAC layer, data link layer, etc.) frames to a service provider network having an SFC infrastructure. FIG. 1 depicts an example network architecture 100 that includes devices configured to enable such an implementation. As shown, the architecture 100 may include, but is not limited to, a wireless access gateway (WAG) 110 (hereinafter referred to as the proxy 110) that may be in communication with various mobile devices 120 a-120 c (hereinafter the mobile devices 120) and a residential gateway 124 over a layer 3 wireless access network 130. The residential gateway 124 (which may be configured to provide cellular access to the wireless access network 130), may be located at a customer premises and may be connected to various user devices such as security system 122 a, television 122 b and laptop computer 122 c as well as a cable modem 126. The proxyl 10 may also be in communication with one or more service provider networks 150 which may include a layer 2 SFC infrastructure 160.
  • As will be described in greater detail herein, the proxy 110 may be a termination device which functions as a layer 2 proxy for communicating layer 2 (or 802.3) frames from the mobile devices 120 and/or the residential gateway 124 to the SFC infrastructure 160. In particular, the proxy 110 may be configured to utilize a tunnel (i.e., a layer 3 IPSec tunnel) 140 for receiving 802.3 frames from the mobile devices 120 (and/or the residential gateway 124) for sending to the SFC infrastructure 160.
  • In some embodiments, the wireless access network 130 may be either a 3rd Generation Partnership Project (3GPP) (i.e., GSM) or a 3rd Generation Partnership Project 2 (3GPP2) (i.e., CDMA) network. As used herein, the term “device” may refer to any computing component that includes one or more processors that can be configured to execute computer-readable, computer-implemented, or computer-executable instructions. Example devices may include, but are not limited to, customer premise equipment, set-top boxes, cable modems, digital tablets, digital assistants, personal digital assistants, smart phones, personal computers, server farms, Internet appliances, smart cards, wearable devices, application-specific circuits, microcontrollers, minicomputers, transceivers, kiosks, or other processor-based devices. The execution of suitable computer-implemented instructions by one or more processors associated with various devices may form special purpose computers or other particular machines that may implement or facilitate a personal cloud experience for users as described herein.
  • The above descriptions in FIG. 1 are for purposes of illustration and are not meant to be limiting. Other descriptions, examples, embodiments, etc., may exist in other examples.
  • FIG. 2 depicts an example computing environment 200 for implementing a layer two proxy for wireless data from mobile devices, according to an embodiment of the disclosure. The example computing environment 200 may include, but is not limited to, the proxy 110 and the mobile devices 120. Although a certain number of these devices are shown in FIG. 2, any number of these devices may exist in other embodiments. For example, other devices may include the residential gateway 124, the cable modem 126 and the user devices 122 shown in FIG. 1.
  • As described above in association with FIG. 1, the proxy 110 in FIG. 2 may communicate with the mobile devices 120 over the wireless access network 130. The proxy 110 in FIG. 2 may include one or more processors configured to communicate with one or more memory devices and various other components or devices. For example, the proxy 110 may include one or more processors 212 that are configured to communicate with one or more memory or memory devices 222, one or more input/output (I/O) devices 214, storage 216, one or more communication connections 218, and one or more data stores 220. The processor 212 may be implemented as appropriate in hardware, software, firmware, or a combination thereof. The hardware devices 242-250 associated with each of the mobile devices 120, may be the same or at least similar to the processor 212, the I/O devices 214, the storage 216, the communication connection 218 and the data store 220, respectively, in the proxy 110.
  • The memory 222 of the proxy 110 may store program instructions that are loadable and executable on the processor 212, as well as data generated during the execution of these programs. Depending on the configuration and type of the proxy 110, the memory 222 may be volatile, such as random access memory (RAM), and/or non-volatile, such as read-only memory (ROM), flash memory, etc. The memory 262 associated with each of the mobile devices 120, may be the same or at least similar to the memory 222.
  • The storage 216 of the proxy 110 may include removable and/or non-removable storage including, but not limited to, magnetic storage, optical disks, and/or tape storage. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the computing devices. The storage associated within the home gateway 240 and the user device 270, respectively, may be the same or at least similar to the storage 216.
  • The memory 222 and the storage 216, both removable and non-removable, are all examples of computer-readable storage media. For example, computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. In some implementations, the memory 222 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM), or ROM.
  • The one or more communication connections 218 may allow the proxy 110 to communicate with the mobile devices 120.
  • The I/O devices 214 may enable interaction with the proxy 110. Such I/O devices 214 may include, but are not limited to, a keyboard, a mouse, a pen, a voice input device, a touch input device, a gesture capture or detection device, a display, a camera or imaging device, speakers, or a printer.
  • The data store 220 may store lists, arrays, databases, flat files, etc. In some implementations, the data store 220 may be stored in memory external to the proxy 110 but may be accessible via the wireless access network 130. In some embodiments, all or at least a portion of such information may be stored in the data stores 220, while at least another portion of the information may be stored in one or more databases or other storage mechanisms, whether local or remote from the proxy 110.
  • Turning to the contents of the memory 222, the memory 222 may include an operating system 224 and various software applications and/or modules that may implement or facilitate the processes described herein. Example modules may include, but are not limited to, a communication module 226, a device identification module 228, a service authentication module 230, and a tunnel module 232. Each of these modules may be implemented as individual modules that provide specific functionality associated with the processes implemented or facilitate herein by the proxy 110. Alternatively, one or more of the modules may perform all or at least some of the functionality associated with the other modules.
  • The operating system 224 may refer to a collection of software that manages computer hardware resources and provides common services for computer programs to enable and facilitate operation of such programs. Example operating systems may include Android, other mobile device operating systems, UNIX, Microsoft Windows, Apple OS X, Mac OS, Linux, Solaris, etc. The operating system 264 associated with each of the mobile devices 120 may include at least one of the above example operating systems.
  • The communication module 226 may configure the proxy 110 to communicate with the mobile devices 120 shown in FIG. 2, as described above. The device identification module 228 may identify the mobile devices 120. Such identification may include determining device and network (i.e., the wireless access network 130) information for the mobile devices 120.
  • The service authentication module 230 may authenticate access to layer 2 services in the SFC infrastructure 160 of the service provider network 150. By knowing which mobile device 120 has requested a service, the service authentication module 230 may determine whether the mobile device 120 and/or a user of the mobile device 120 may access the service.
  • The memory 252 of the proxy 110 may include a tunnel module 256. The tunnel module 256 may establish a tunnel with the mobile devices 120, in one embodiment.
  • The memory 282 of each of the mobile devices 120 may include one or more user applications 686. The one or more user applications 266 may configure the mobile devices 120 to send, receive, interact with, etc., various content, such as video, audio, data, multimedia, text, and other information.
  • FIG. 3 illustrates a block diagram of an example environment 300 for utilizing a layer two proxy to send layer two frames from mobile devices to a service function chain (SFC) infrastructure, according to an embodiment of the disclosure. The environment 300 of FIG. 3 includes the proxy 110, the mobile devices 120, and the SFC infrastructure 160. The proxy 110 may be configured to establish the tunnel 140 and receive (over the tunnel 140) device information and wireless network information 310 from the mobile devices 120. The proxy 110 may then be configured to create and/or assign a source and destination MAC addresses 330 corresponding to the received device and wireless network information 310. The proxy 110 may also receive (over the tunnel 140) one or more IP packets from the mobile devices 120.
  • The proxy 110 may then be configured to generate layer two frames 340 utilizing the assigned source and destination MAC addresses 330. The layer two frames 340 encapsulate the IP packets 320 received from the mobile devices 120. The proxy 110 may then transmit the layer 2 frames 350 to the SFC infrastructure 160.
  • FIG. 4 illustrates a block diagram of an example environment 400 for utilizing a layer two proxy to send Internet protocol (IP) packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure. The environment 400 of FIG. 4 includes the proxy 110, the mobile devices 120, and the SFC infrastructure 160. The proxy 110 may be configured to receive layer two frames 410 from the SFC infrastructure 160. The layer two frames may include encapsulated IP packets 420. The proxy 110 may then strip the layer two frames 410 and insert only the IP packets 420 into the tunnel 140, back to the mobile devices 120.
  • FIG. 5 depicts a flow diagram of an example process 500 for utilizing a layer two proxy for sending layer two frames from mobile devices to an SFC infrastructure, according to an embodiment of the disclosure. The example process 500 may be implemented by the proxy 110 of FIGS. 1-4. The example process 500 may begin at block 502, where the proxy 110 may receive (e.g., by the communication module 226) mobile device and wireless network information, from the tunnel 140, for the mobile devices 120. In particular, the mobile device and wireless network information may be received over a layer three network connection. In one embodiment, the tunnel 140 may be an IPsec tunnel. In one embodiment, the layer three network connection may be a cellular network connection. The cellular network connection may include, but is not limited to, a global system for mobile communications (GSM) network connection, a code division multiple access (CDMA) network connection, and a long-term evolution (LTE) network connection.
  • The example process 500 may continue at block 504, where the proxy 110 may assign source and destination addresses corresponding to the device and wireless network information received at block 502. The source address may be a source media access control (MAC) address and the destination address may be a destination MAC address.
  • The example process 500 may continue at block 506, where the proxy 110 may receive IP packets from the mobile devices 120 from the tunnel 140.
  • The example process 500 may continue at block 508, where the proxy 110 may generate layer two frames to encapsulate each received IP packet using the assigned source and destination MAC addresses. In one embodiment, the layer two frames may be 802.3 downlink frames.
  • The example process 500 may continue at block 510, where the proxy 110 may transmit the layer two frames to the SFC infrastructure 160.
  • FIG. 6 depicts a flow diagram of an example process 600 for utilizing a layer two proxy for sending IP packets from an SFC infrastructure to mobile devices, according to an embodiment of the disclosure. The example process 600 may be implemented by the proxy 110 of FIGS. 1-4. The example process 600 may begin at block 602, where the proxy 110 may receive (e.g., by the communication module 226) layer 2 frames having encapsulated IP packets from the SFC infrastructure 160.
  • The example process 600 may continue at block 604 where the proxy 110 may separate (i.e., strip) the layer two frames from the IP packets. In one embodiment, the layer two frames may be 802.3 uplink frames.
  • The example process 600 may continue at block 606 where the proxy 110 may send the IP packets to the mobile devices 120 using the tunnel 140. In particular, the proxy 110 may be configured to insert the IP packets into an IPsec tunnel over a layer three connection with the mobile devices 120. In one embodiment, the layer three network connection may be a cellular network connection. The cellular network connection may include, but is not limited to, a GSM network connection, a CDMA network connection, and an LTE network connection.
  • Various block and/or flow diagrams of systems, methods, apparatus, and/or computer program products according to example embodiments of the invention are described above. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, or may not necessarily need to be performed at all, according to some embodiments of the invention.
  • The computer-executable program instructions may be loaded onto a special purpose computer or other particular machine, a processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions that execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flow diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks. As an example, embodiments of the invention may provide for a computer program product, comprising a computer-usable medium having a computer-readable program code or program instructions embodied therein, said computer-readable program code adapted to be executed to implement one or more functions specified in the flow diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flow diagram block or blocks.
  • Accordingly, blocks of the block diagrams and flow diagrams support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, can be implemented by special purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
  • Many modifications and other embodiments of the invention set forth herein will be apparent having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (20)

What is claimed is:
1. A system, comprising:
at least one memory for storing computer-executable instructions; and
one or more processors configured to access the at least one memory and execute the computer-executable instructions to:
receive, via a tunnel, device information and wireless network information from at least one mobile device over a layer three network connection;
responsive to receipt of the device information and the wireless network information, assign a source address and a destination address to the at least one mobile device, the source address and the destination address corresponding to the device information and the wireless network information;
receive, via the tunnel, one or more Internet protocol (IP) packets from the at least one mobile device;
generate one or more layer two frames utilizing the assigned source and destination addresses, the frames encapsulating each of the one or more IP packets; and
transmit the one or more layer two frames to a layer two service function chain (SFC) infrastructure.
2. The system of claim 1, wherein the tunnel comprises an IP security (IPsec) tunnel.
3. The system of claim 1, wherein the source address comprises a source media access control (MAC) address and the destination address comprises a destination MAC address.
4. The system of claim 1, wherein the one or more layer two frames comprise one or more downlink frames.
5. The system of claim 1, wherein the one or more layer two frames comprise one or more 802.3 frames.
6. The system of claim 1, wherein the layer three network connection comprises a cellular network connection.
7. The system of claim 6, wherein the cellular network connection comprises at least one of: a global system for mobile communications (GSM) network connection, a code division multiple access (CDMA) network connection and a long-term evolution (LTE) network connection.
8. A method, comprising:
receiving, via a tunnel, device information and wireless network information from at least one mobile device over a layer three network connection;
responsive to receiving the device information and the wireless network information, assigning a source address and a destination address to the at least one mobile device, the source address and the destination address corresponding to the device information and the wireless network information;
receiving, via the tunnel, one or more Internet protocol (IP) packets from the at least one mobile device;
generating one or more layer two frames utilizing the assigned source and destination addresses, the frames encapsulating each of the one or more IP packets; and
sending the one or more layer two frames to a layer two service function chain (SFC) infrastructure.
9. The method of claim 8, wherein the tunnel comprises an IP security (IPsec) tunnel.
10. The method of claim 8, wherein the source address comprises a source media access control (MAC) address and the destination address comprises a destination MAC address.
11. The method of claim 8, wherein the one or more layer two frames comprise one or more downlink frames.
12. The method of claim 8, wherein the one or more layer two frames comprise one or more 802.3 frames.
13. The method of claim 8, wherein the layer three network connection comprises a cellular network connection.
14. The method of claim 13, wherein the cellular network connection comprises at least one of: a global system for mobile communications (GSM) network connection, a code division multiple access (CDMA) network connection and a long-term evolution (LTE) network connection.
15. One or more non-transitory machine-accessible media having stored thereon instructions that, when executed by one or more machines, cause the one or more machines to perform the operations comprising:
receiving one or more Internet protocol (IP) packets encapsulated in one or more layer two frames from a layer two service function chain (SFC) infrastructure;
separating the one or more layer two frames from the one or more IP packets; and
sending the one or more IP packets to one or more mobile devices via a tunnel.
16. The one or more non-transitory machine-accessible media of claim 15, wherein sending the one or more IP packets to the mobile device via a tunnel comprises sending the one or more IP packets over a layer three connection with the one or more mobile devices via the tunnel.
17. The one or more non-transitory machine-accessible media of claim 16, wherein the layer three network connection comprises a cellular network connection, the cellular network connection comprising at least one of: a global system for mobile communications (GSM) network connection, a code division multiple access (CDMA) network connection and a long-term evolution (LTE) network connection.
18. The one or more non-transitory machine-accessible media of claim 15, wherein the tunnel comprises an IP security (IPsec) tunnel.
19. The one or more non-transitory machine-accessible media of claim 15, wherein the one or more layer two frames comprise one or more uplink frames.
20. The one or more non-transitory machine-accessible media of claim 15, wherein the one or more layer two frames comprise one or more 802.3 frames.
US15/002,591 2016-01-21 2016-01-21 Systems and methods for implementing a layer two proxy for wireless network data Active 2036-07-12 US11108592B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/002,591 US11108592B2 (en) 2016-01-21 2016-01-21 Systems and methods for implementing a layer two proxy for wireless network data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/002,591 US11108592B2 (en) 2016-01-21 2016-01-21 Systems and methods for implementing a layer two proxy for wireless network data

Publications (2)

Publication Number Publication Date
US20170214546A1 true US20170214546A1 (en) 2017-07-27
US11108592B2 US11108592B2 (en) 2021-08-31

Family

ID=59360907

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/002,591 Active 2036-07-12 US11108592B2 (en) 2016-01-21 2016-01-21 Systems and methods for implementing a layer two proxy for wireless network data

Country Status (1)

Country Link
US (1) US11108592B2 (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6480489B1 (en) * 1999-03-01 2002-11-12 Sun Microsystems, Inc. Method and apparatus for data re-assembly with a high performance network interface
US20060014522A1 (en) * 2003-11-26 2006-01-19 Mark Krischer Method and apparatus to provide inline encryption and decryption for a wireless station via data streaming over a fast network
US20080205345A1 (en) * 2005-09-30 2008-08-28 Joachim Sachs Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
US7580409B1 (en) * 2003-09-08 2009-08-25 Extreme Networks, Inc. System for and method of communicating control information between entities interconnected by backplane connections
US20090240789A1 (en) * 2008-03-24 2009-09-24 Sankarlingam Dandabany Method and system for removing a tunnel between portal points
US20100189103A1 (en) * 2007-06-19 2010-07-29 Panasonic Corporation Header Size Reduction of Data Packets
US20120063428A1 (en) * 2008-10-08 2012-03-15 Panasonic Corporation Interface Switching System, Mobile Node, Proxy Node, and Mobile Management Node
US20130114540A1 (en) * 2010-09-20 2013-05-09 Huawei Device Co., Ltd. Antenna communication method and device
US20140185623A1 (en) * 2012-12-31 2014-07-03 Emulex Design And Manufacturing Adaptive receive path learning to facilitate combining tcp offloading and network adapter teaming
US20140294018A1 (en) * 2011-11-11 2014-10-02 Pismo Labs Technology Limited Protocol for layer two multiple network links tunnelling
US20150092564A1 (en) * 2013-09-27 2015-04-02 Futurewei Technologies, Inc. Validation of Chained Network Services
US20150326473A1 (en) * 2014-05-09 2015-11-12 Futurewei Technologies, Inc. Service Chain Path Route Reservations
US20150326470A1 (en) * 2014-05-09 2015-11-12 Futurewei Technologies, Inc. System and Method for Loop Suppression in Transit Networks

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7417995B2 (en) * 2004-01-20 2008-08-26 Nortel Networks Limited Method and system for frame relay and ethernet service interworking
US20080130490A1 (en) * 2005-03-25 2008-06-05 Hangzhou H3C Technologies Co., Ltd. Method For Implementing on-Ring Process, Off-Ring Process and Data Forwarding in Resilience Packet Data Ringnet and a Network Device Thereof
US8508773B2 (en) * 2009-12-16 2013-08-13 Xerox Corporation Media access control address installation for tandem print engine configurations
US9088584B2 (en) * 2011-12-16 2015-07-21 Cisco Technology, Inc. System and method for non-disruptive management of servers in a network environment
US8982734B2 (en) * 2012-06-26 2015-03-17 Intel Corporation Methods, apparatus, and systems for routing information flows in networks using spanning trees and network switching element resources
US9654406B2 (en) * 2012-12-26 2017-05-16 Realtek Singapore Pte Ltd Communication traffic processing architectures and methods
US9306761B2 (en) * 2014-03-10 2016-04-05 Gazoo, Inc. Video streaming system and method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6480489B1 (en) * 1999-03-01 2002-11-12 Sun Microsystems, Inc. Method and apparatus for data re-assembly with a high performance network interface
US7580409B1 (en) * 2003-09-08 2009-08-25 Extreme Networks, Inc. System for and method of communicating control information between entities interconnected by backplane connections
US20060014522A1 (en) * 2003-11-26 2006-01-19 Mark Krischer Method and apparatus to provide inline encryption and decryption for a wireless station via data streaming over a fast network
US20080205345A1 (en) * 2005-09-30 2008-08-28 Joachim Sachs Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
US20100189103A1 (en) * 2007-06-19 2010-07-29 Panasonic Corporation Header Size Reduction of Data Packets
US20090240789A1 (en) * 2008-03-24 2009-09-24 Sankarlingam Dandabany Method and system for removing a tunnel between portal points
US20120063428A1 (en) * 2008-10-08 2012-03-15 Panasonic Corporation Interface Switching System, Mobile Node, Proxy Node, and Mobile Management Node
US20130114540A1 (en) * 2010-09-20 2013-05-09 Huawei Device Co., Ltd. Antenna communication method and device
US20140294018A1 (en) * 2011-11-11 2014-10-02 Pismo Labs Technology Limited Protocol for layer two multiple network links tunnelling
US20140185623A1 (en) * 2012-12-31 2014-07-03 Emulex Design And Manufacturing Adaptive receive path learning to facilitate combining tcp offloading and network adapter teaming
US20150092564A1 (en) * 2013-09-27 2015-04-02 Futurewei Technologies, Inc. Validation of Chained Network Services
US20150326473A1 (en) * 2014-05-09 2015-11-12 Futurewei Technologies, Inc. Service Chain Path Route Reservations
US20150326470A1 (en) * 2014-05-09 2015-11-12 Futurewei Technologies, Inc. System and Method for Loop Suppression in Transit Networks

Also Published As

Publication number Publication date
US11108592B2 (en) 2021-08-31

Similar Documents

Publication Publication Date Title
US11431680B2 (en) Cloud interface for use of cloud services
CN107872542B (en) Data transmission method and network equipment
US8650326B2 (en) Smart client routing
CN110022264B (en) Method for controlling network congestion, access device and computer readable storage medium
CN106797335B (en) Data transmission method, data transmission device, electronic equipment and computer program product
US20150120943A1 (en) Secure mobile access to resources within a private network
JP2020517132A (en) Method, apparatus and system for implementing policy control
WO2021174943A1 (en) Data forwarding method and apparatus, and device and storage medium
US20220029917A1 (en) Executing workloads across multiple cloud service providers
US20190028559A1 (en) Tcp fast open hardware support in proxy devices
CN106878133A (en) Message forwarding method and device
WO2020188139A1 (en) Network based media processing security
CN110417632B (en) Network communication method, system and server
US9917926B2 (en) Communication method and communication system
CN111587586B (en) GTP tunnel supporting anchor-free backhaul
US11677585B2 (en) Transparent TCP connection tunneling with IP packet filtering
CN108064441B (en) Method and system for accelerating network transmission optimization
US11108592B2 (en) Systems and methods for implementing a layer two proxy for wireless network data
WO2018108133A1 (en) Data network information processing method, device, terminal and storage medium
WO2015096734A1 (en) Downlink transmission method for service data, and packet data gateway
EP3220584A1 (en) Wifi sharing method and system, home gateway and wireless local area network gateway
CN113542431A (en) Information processing method, information processing device, electronic equipment and storage medium
CN105763414A (en) Method and device for learning table entry
CN105227569A (en) The data pack transmission method of application and device
WO2023005620A1 (en) Message processing method and apparatus, and communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: COX COMMUNICATIONS, INC., GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FINKELSTEIN, JEFFREY L.;REEL/FRAME:037545/0564

Effective date: 20160120

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCF Information on status: patent grant

Free format text: PATENTED CASE